{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:06:54Z","timestamp":1775326014347,"version":"3.50.1"},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,15]]},"DOI":"10.1109\/icoin63865.2025.10992901","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T17:30:44Z","timestamp":1747243844000},"page":"207-212","source":"Crossref","is-referenced-by-count":2,"title":["Two-Level Detection Method of DDoS Attack Mimicking CDN Caches"],"prefix":"10.1109","author":[{"given":"Kazuya","family":"Taniguchi","sequence":"first","affiliation":[{"name":"Ritsumeikan University,Graduate School of Information Science and Engineering,Osaka,Japan,567-8570"}]},{"given":"Noriaki","family":"Kamiyama","sequence":"additional","affiliation":[{"name":"Ritsumeikan University,College of Information Science and Engineering,Osaka,Japan,567-8570"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Mordor Intelligence, Content Delivery Network Market Size & Share Analysis - Growth Trends & Forecasts"},{"key":"ref2","volume-title":"CDN Judo: Breaking the CDN DoS Protection with Itself, Network and Distributed Systems Security (NDSS) Symposium","author":"Guo"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/netsoft51509.2021.9492633"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485385"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3093492"},{"key":"ref7","article-title":"Protecting Websites from Attack with Secure Delivery Networks","year":"2015","journal-title":"Comp. Mag"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3100308"},{"key":"ref9","article-title":"A Wind Direction Forecasting Method Based on Z Score Normalization and Long Short Term Memory","author":"Hou","year":"2019","journal-title":"ICGEA"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813633"}],"event":{"name":"2025 International Conference on Information Networking (ICOIN)","location":"Chiang Mai, Thailand","start":{"date-parts":[[2025,1,15]]},"end":{"date-parts":[[2025,1,17]]}},"container-title":["2025 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10992637\/10992586\/10992901.pdf?arnumber=10992901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T04:33:30Z","timestamp":1747283610000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10992901\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,15]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/icoin63865.2025.10992901","relation":{},"subject":[],"published":{"date-parts":[[2025,1,15]]}}}